CFP last date
20 January 2025
Reseach Article

Comparative Study of Data Possession Techniques for Data Storage as a Service (DSaaS)

by Parth D Shah, Amit P Ganatra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 80 - Number 4
Year of Publication: 2013
Authors: Parth D Shah, Amit P Ganatra
10.5120/13853-1691

Parth D Shah, Amit P Ganatra . Comparative Study of Data Possession Techniques for Data Storage as a Service (DSaaS). International Journal of Computer Applications. 80, 4 ( October 2013), 38-42. DOI=10.5120/13853-1691

@article{ 10.5120/13853-1691,
author = { Parth D Shah, Amit P Ganatra },
title = { Comparative Study of Data Possession Techniques for Data Storage as a Service (DSaaS) },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 80 },
number = { 4 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 38-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume80/number4/13853-1691/ },
doi = { 10.5120/13853-1691 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:53:41.684816+05:30
%A Parth D Shah
%A Amit P Ganatra
%T Comparative Study of Data Possession Techniques for Data Storage as a Service (DSaaS)
%J International Journal of Computer Applications
%@ 0975-8887
%V 80
%N 4
%P 38-42
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is a utility where software, infrastructure or storage can be purchased remotely. Users can access data from anywhere through network connectivity. In Cloud Computing resources are shared among different user so that all users can access the data from shared infrastructure via same physical hardware. However, this technique raises many concerns over the honesty of network users. Because of shared resources used in Cloud, user does not have permission to modify, delete or access of other user's data. Also users do not have control of their own data in cloud. So data integrity is one of the biggest security issues come in picture of Cloud Computing. For the Cloud service provider to provide integrity of user's data in cloud is extremely difficult task. To provide integrity of user data traditional integrity tools do not use because of dynamic nature of user data. Providing monitoring service will help data owners to ensure integrity and also provides a transparent yet cost-effective method for data owners to gain trust in the cloud. Provable Data Possession (PDP) allows data owner to periodically check their data stored in cloud storage are intact. In this method client can check without downloading the file as well does not required a local copy. Another method which could be considered as improvement over PDP is Proof of Retrivebility (POR). This method detects data integrity as well as it recovers original data. Both methods are probabilistic. As a part of this paper work data integrity techniques have been surveyed and some of the research gaps have been identified which is presented here.

References
  1. The NIST Definition of Cloud Computing (v15) Mell, Peter and Grance, Tim (2009) http://csrc. nist. gov/groups/SNS/cloud-computing/
  2. Trusted Cloud Computing with Secure Resources and Data Coloring by: Kai Hwang, Deyi Li IEEE Internet Computing, Vol. 14, No. 5. (September 2010), pp. 14-22, oi:10. 1109/MIC. 2010. 86 Key: citeulike:8983216
  3. Andrew OneDegree Blog, Andrew Smith, http://andrewonedegree. wordpress. com/2010/01/20/virtualisation-its-not-a-cloud/20012010
  4. Difference between Cloud computing and Utitlity computing, Uchit Vyas, http://cloudbyuchit. blogspot. in/2012/03/difference-between-cloud-computing-and. html
  5. Cloud Computing Issues, Dynaroll Corp. , http://www. dataplex. com/blog/index. php/2010/01/07/cloud-computing-issues/
  6. A survey on security issues in service delivery models of cloud computing, Subashini S, Kavitha V. J Network Comput Appl (2010), doi:10. 1016/j. jnca. 2010. 07. 006
  7. Securing virtual machines in the cloud, David Strom, http://searchcloudcomputing. techtarget. com/tip/Securing-virtual-machines-in-the-cloud
  8. Intrusion detection in a cloud computing environment, Phil Cox, http://searchcloudcomputing. techtarget. com/ tip/Intrusion-detection-in-a-cloud-computing-environment
  9. Securing data in the cloud, Phil Cox, http://searchcloudcomputing. techtarget. com/tip/Securing-data-in-the-cloud
  10. http://blog. cloudplan. org/2011/05/key-research-challenges-in-cloud. html
  11. "Remote integrity checking", Yves Deswarte, Jean-Jacques Quisquater, Ayda Saïdane, In: Proc. Of IICIS '03, pp. 1–11, 2003
  12. "Provable data possession at untrusted stores", Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson,Dawn Song, In: Proc. of ACM-CCS '07, pp. 598–609, 2007.
  13. "Scalable and efficient provable data possession", Giuseppe Ateniese, Roberto Di Pietro, Luigi V. Mancini, Gene Tsudik, In: Proc. of SecureComm '08, pp. 1-10, 2008.
  14. "MR-PDP: Multiple-replica provable data possession", Reza Curtmola, Osama Khan, Randal Burns, Giuseppe Ateniese, In: Proc. of ICDCS '08, pp. 411-420, 2008.
  15. "A Practical Data Possession Checking Scheme for Networked Archival Storage", Xiao Da, Shu Jiwu, Chen Kang, Zheng Weimin, Journal of Computer Research and Development, 46(10):1660-1668, 2009.
  16. "Dynamic provable data possession", C. Chris Erway, Alptekin Kupcu, Charalampos Papamanthou, Roberto Tamassia, In: Proc. of ACM-CCS '09, pp. 213-222, 2009.
  17. "Pors: proofs of retrievability for large files", Ari Juels, Burton S. Kaliski Jr. , In: Proc. of ACMCCS '07, pp. 584-597, 2007.
  18. Qingji Zheng and Shouhuai Xu. Secure and efficient proof of storage with deduplication. In CODASPY '12: ACM conference on Data and Application Security and Privacy, pages 1–12, 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Data Storage Secuority challenges Integrity proofs Remote Data Checking